computer security set 1 Detailed Explanation And More Example
MOST IMPORTANT computer mcq - 3 EXERCISES
The following question based on computer security topic of computer mcq
(a) security exploit
(b) vulnerability scanner
(c) packet sniffer
(d) rootkit
The correct answers to the above question in:
Answer: (c)
Discuss Form
Read more computer security Based Computer Questions and Answers
Question : 1
A vulnerability scanner is
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Answer »Answer: (b)
Question : 2
Like a virus, it is a self-replicating program. It also propagates through computer network.
a) Spyware
b) Worm Cracker
c) Cracker
d) phishing scam
e) None of these
Answer »Answer: (d)
Question : 3
These are program designed as to seem to being or be doing one thing, but actually being or doing another.
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker
Answer »Answer: (a)
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
Question : 4
You can protect sensitive data from prying eyes using ______
a) Encryption
b) Passwords
c) File locks
d) File permissions
e) None of these
Answer »Answer: (d)
Question : 5
It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
a) Rootkit
b) Keylogger
c) Worm
d) Cracker
Answer »Answer: (a)
Question : 6
__________ are often delivered to a PC through an email attachment and are often designed to do harm.
a) Viruses
b) Spam
c) Portals
d) Email messages
e) None of these
Answer »Answer: (a)
A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk
GET computer security PRACTICE TEST EXERCISES
computer security set 1
computer security set 2
computer security set 3
computer security Shortcuts and Techniques with Examples
Verbal Reasoning
Question & Answer Quiz
Non Verbal Reasoning
Question & Answer Quiz
Quantitative Aptitude
Question & Answer Quiz
Computer MCQ
Question & Answer Quiz
General English
Question & Answer Quiz
History GK
Question & Answer Quiz
Polity GK
Question & Answer Quiz
Geography GK
Question & Answer Quiz
Economy GK
Question & Answer Quiz
General Awareness GK
Question & Answer Quiz
Recently Added Subject & Categories For All Competitive Exams
New 100+ Compound Interest MCQ with Answers PDF for IBPS
Compound Interest verbal ability questions and answers solutions with PDF for IBPS RRB PO. Aptitude Objective MCQ Practice Exercises all competitive exams
Continue Reading »
100+ Mixture and Alligation MCQ Questions PDF for IBPS
Most importantly Mixture and Alligation multiple choice questions and answers with PDF for IBPS RRB PO. Aptitude MCQ Practice Exercises all Bank Exams
Continue Reading »
IBPS Profit and Loss Questions Solved Problems with PDF
Most important Profit and Loss multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Aptitude MCQ Practice Exercises all competitive exams
Continue Reading »
100+ Average Aptitude Questions Answers solutions MCQ PDF
New Average multiple choice questions and answers with PDF for IBPS RRB PO. 100+ Quantitative Aptitude MCQ Practice Exercises all competitive exams
Continue Reading »